Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
595s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 13:30
Static task
static1
1 signatures
General
-
Target
Solicitud de Compra.exe
-
Size
5.5MB
-
MD5
0bcccce2c010c4ec39808cf326f825cf
-
SHA1
2bc786d519645a83e985fcd907758fdd7fe12686
-
SHA256
4f4992ebc64f845f531c2e7f3c1a819037c685686ec5a9af906eee4d363908aa
-
SHA512
c0aa3601b1193f7f65f69e7b62bf55634f073fe8019eeeef427f3fc70bded553f9aef3230909de6ed07b9df7057efab6879912d00465014ca45db4b2cf0120ed
-
SSDEEP
49152:sXW7Cv1EIBjk50b1fUsJyi3GGfxkzIHLfiZz3LIFmTb+HUwrD4KhwGpzqROieIMm:k
Malware Config
Extracted
Family
bandook
C2
185.10.68.52
Signatures
-
Bandook family
-
Bandook payload 6 IoCs
resource yara_rule behavioral1/memory/3032-42-0x0000000013140000-0x000000001480D000-memory.dmp family_bandook behavioral1/memory/3032-43-0x0000000013140000-0x000000001480D000-memory.dmp family_bandook behavioral1/memory/3032-45-0x0000000013140000-0x000000001480D000-memory.dmp family_bandook behavioral1/memory/3032-47-0x0000000013140000-0x000000001480D000-memory.dmp family_bandook behavioral1/memory/3032-48-0x0000000013140000-0x000000001480D000-memory.dmp family_bandook behavioral1/memory/3032-46-0x0000000013140000-0x000000001480D000-memory.dmp family_bandook -
resource yara_rule behavioral1/memory/3032-40-0x0000000013140000-0x000000001480D000-memory.dmp upx behavioral1/memory/3032-41-0x0000000013140000-0x000000001480D000-memory.dmp upx behavioral1/memory/3032-42-0x0000000013140000-0x000000001480D000-memory.dmp upx behavioral1/memory/3032-43-0x0000000013140000-0x000000001480D000-memory.dmp upx behavioral1/memory/3032-45-0x0000000013140000-0x000000001480D000-memory.dmp upx behavioral1/memory/3032-47-0x0000000013140000-0x000000001480D000-memory.dmp upx behavioral1/memory/3032-48-0x0000000013140000-0x000000001480D000-memory.dmp upx behavioral1/memory/3032-46-0x0000000013140000-0x000000001480D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solicitud de Compra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solicitud de Compra.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3032 msinfo32.exe 3032 msinfo32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5568 wrote to memory of 3032 5568 Solicitud de Compra.exe 96 PID 5568 wrote to memory of 3032 5568 Solicitud de Compra.exe 96 PID 5568 wrote to memory of 3032 5568 Solicitud de Compra.exe 96 PID 5568 wrote to memory of 1612 5568 Solicitud de Compra.exe 97 PID 5568 wrote to memory of 1612 5568 Solicitud de Compra.exe 97 PID 5568 wrote to memory of 1612 5568 Solicitud de Compra.exe 97 PID 5568 wrote to memory of 3032 5568 Solicitud de Compra.exe 96 PID 5568 wrote to memory of 3032 5568 Solicitud de Compra.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solicitud de Compra.exe"C:\Users\Admin\AppData\Local\Temp\Solicitud de Compra.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5568 -
C:\windows\SysWOW64\msinfo32.exeC:\windows\syswow64\msinfo32.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\Solicitud de Compra.exe"C:\Users\Admin\AppData\Local\Temp\Solicitud de Compra.exe" ooooooooooooooo2⤵
- System Location Discovery: System Language Discovery
PID:1612
-